Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 6 |
Descriptor
Information Security | 6 |
Knowledge Level | 6 |
Teaching Methods | 6 |
Computer Security | 3 |
Behavior Patterns | 2 |
Computer Mediated… | 2 |
Computer Science Education | 2 |
Crime | 2 |
Foreign Countries | 2 |
Handheld Devices | 2 |
Privacy | 2 |
More ▼ |
Author
Alqarni, Amani | 1 |
Carliner, Saul, Ed. | 1 |
Chu, Bei-Tseng | 1 |
Dawn C. Tatum | 1 |
Kizza, Joseph | 1 |
Laurel Lynn Schneider | 1 |
Ng, Wing Shui | 1 |
Ostashewski, Nathaniel, Ed. | 1 |
Rorrer, Audrey | 1 |
Williams, Kenneth | 1 |
Winters, Kathy | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 3 |
Journal Articles | 2 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 3 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Location
Hong Kong | 1 |
North Carolina | 1 |
Tennessee | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dawn C. Tatum – ProQuest LLC, 2023
Gamification is a term used to describe the art of taking a process or a task and making it into a game. Using games as a way to make mundane tasks or necessary lessons more fun is used in many aspects of life. Parents often use games to teach children tasks, and teachers use games to enforce learning, and much more. The gamification of Security…
Descriptors: Game Based Learning, Information Security, Computer Security, Behavior Patterns
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Ng, Wing Shui – Journal of Information Technology Education: Research, 2020
Aim/Purpose: Teachers usually educate students' cyberethics using debate, case-based discussion, and role-playing instructional methods in a face-to-face setting. With the presence of teacher and peers, students may not be willing to share their true attitudes, and it may affect the effectiveness of the teaching methods. To tackle the challenge,…
Descriptors: Ethics, Teaching Methods, Instructional Effectiveness, Self Evaluation (Individuals)
Alqarni, Amani – ProQuest LLC, 2017
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Descriptors: Computer Security, College Students, Student Behavior, Information Security
Yuan, Xiaohong; Williams, Kenneth; Yu, Huiming; Rorrer, Audrey; Chu, Bei-Tseng; Yang, Li; Winters, Kathy; Kizza, Joseph – Journal of Information Systems Education, 2017
Though many Information Assurance (IA) educators agree that hands-on exercises and case studies improve student learning, hands-on exercises and case studies are not widely adopted due to the time needed to develop them and integrate them into curricula. Under the support of the National Science Foundation (NSF) Scholarship for Service program, we…
Descriptors: Case Studies, Information Security, Teacher Workshops, Teaching Methods
Carliner, Saul, Ed.; Ostashewski, Nathaniel, Ed. – Association for the Advancement of Computing in Education, 2015
The Association for the Advancement of Computing in Education (AACE) is an international, non-profit educational organization. The Association's purpose is to advance the knowledge, theory, and quality of teaching and learning at all levels with information technology. "EdMedia 2015: World Conference on Educational Media &…
Descriptors: Educational Technology, Technology Uses in Education, Action Research, Instructional Design